Apple assumes no responsibility with regard to the selection. Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Learn more about the Apple Security Bounty. If the threats are evolving, our defenses must as well. In certain cases, Apple pays rewards for sharing critical security issues. Chances are, however, their luck won’t be so good against them.Īs more consumers and banks get on board with mobile payments, I wouldn’t be too surprised if the majority of people do transactions from their phones instead of their wallets in the not-so-distant future. That is unless some bold hacker decides to hit Samsung or Apple. The Checkers hack only worked because of how it targeted data from card swipes, so if no cards are involved, there’s nothing to steal. If you’re worried about running into a data breach like this one in the future, there is a solution that can give you more peace of mind - mobile payment systems like Apple Pay and Samsung Pay.ĭue to the fact that both methods use encrypted, one-time payment codes for transactions, your card number never reaches the POS system. Apple’s lawsuit is seeking unspecified damages for the time and cost it had to invest to deal with the NSO Group’s alleged violation and abuse of its products. If you have further questions for Checkers about the breach, the company is taking calls at a toll-free number. Usually, these companies will take care of any unauthorized charges if reported in a timely manner, so don’t hesitate if you find any. Make sure to look carefully at your bank and credit card statements for the past several months and report any suspicious charges to your card issuers. What can I do to protect myself if I was affected by the breach?Īccording to the statement from Checkers, affected customers should check with their respective banks and financial institutions to make sure no unauthorized activity took place. The company could add more impacted locations to the list later. We are happy to schedule client consultations and client meetings by telephone or video-conference at your request.
However, you should still be cautious and keep an eye on your bank statements just in case. Our office remains open to serve your important legal needs during these turbulent and challenging times. After identifying the threat, the company put together a complete list of stores targeted by hackers.Īs of now, only certain locations have been breached, so if you didn’t visit any of these locations, you’re probably safe from harm. Olivia from Apple support has called 11 times to my home number in the past 2.5 hours telling us that they have detected fraudulent activity on our i-cloud apple account. If this data were to fall into the hands of a crook, they could easily make unauthorized charges - potentially without being flagged for it.Īccording to a press release from the company, not every visitor was affected by the breach.